Debian Security Advisory
DSA-673-1 evolution -- integer overflow
- Date Reported:
- 10 Feb 2005
- Affected Packages:
- evolution
- Vulnerable:
- Yes
- Security database references:
- In the Bugtraq database (at SecurityFocus): BugTraq ID 12354.
In Mitre's CVE dictionary: CVE-2005-0102. - More information:
-
Max Vozeler discovered an integer overflow in a helper application inside of Evolution, a free groupware suite. A local attacker could cause the setuid root helper to execute arbitrary code with elevated privileges.
For the stable distribution (woody) this problem has been fixed in version 1.0.5-1woody2.
For the unstable distribution (sid) this problem has been fixed in version 2.0.3-1.2.
We recommend that you upgrade your evolution package.
- Fixed in:
-
Debian GNU/Linux 3.0 (woody)
- Source:
- http://security.debian.org/pool/updates/main/e/evolution/evolution_1.0.5-1woody2.dsc
- http://security.debian.org/pool/updates/main/e/evolution/evolution_1.0.5-1woody2.diff.gz
- http://security.debian.org/pool/updates/main/e/evolution/evolution_1.0.5.orig.tar.gz
- http://security.debian.org/pool/updates/main/e/evolution/evolution_1.0.5-1woody2.diff.gz
- Alpha:
- http://security.debian.org/pool/updates/main/e/evolution/evolution_1.0.5-1woody2_alpha.deb
- http://security.debian.org/pool/updates/main/e/evolution/libcamel-dev_1.0.5-1woody2_alpha.deb
- http://security.debian.org/pool/updates/main/e/evolution/libcamel0_1.0.5-1woody2_alpha.deb
- http://security.debian.org/pool/updates/main/e/evolution/libcamel-dev_1.0.5-1woody2_alpha.deb
- ARM:
- http://security.debian.org/pool/updates/main/e/evolution/evolution_1.0.5-1woody2_arm.deb
- http://security.debian.org/pool/updates/main/e/evolution/libcamel-dev_1.0.5-1woody2_arm.deb
- http://security.debian.org/pool/updates/main/e/evolution/libcamel0_1.0.5-1woody2_arm.deb
- http://security.debian.org/pool/updates/main/e/evolution/libcamel-dev_1.0.5-1woody2_arm.deb
- Intel IA-32:
- http://security.debian.org/pool/updates/main/e/evolution/evolution_1.0.5-1woody2_i386.deb
- http://security.debian.org/pool/updates/main/e/evolution/libcamel-dev_1.0.5-1woody2_i386.deb
- http://security.debian.org/pool/updates/main/e/evolution/libcamel0_1.0.5-1woody2_i386.deb
- http://security.debian.org/pool/updates/main/e/evolution/libcamel-dev_1.0.5-1woody2_i386.deb
- Intel IA-64:
- http://security.debian.org/pool/updates/main/e/evolution/evolution_1.0.5-1woody2_ia64.deb
- http://security.debian.org/pool/updates/main/e/evolution/libcamel-dev_1.0.5-1woody2_ia64.deb
- http://security.debian.org/pool/updates/main/e/evolution/libcamel0_1.0.5-1woody2_ia64.deb
- http://security.debian.org/pool/updates/main/e/evolution/libcamel-dev_1.0.5-1woody2_ia64.deb
- Motorola 680x0:
- http://security.debian.org/pool/updates/main/e/evolution/evolution_1.0.5-1woody2_m68k.deb
- http://security.debian.org/pool/updates/main/e/evolution/libcamel-dev_1.0.5-1woody2_m68k.deb
- http://security.debian.org/pool/updates/main/e/evolution/libcamel0_1.0.5-1woody2_m68k.deb
- http://security.debian.org/pool/updates/main/e/evolution/libcamel-dev_1.0.5-1woody2_m68k.deb
- PowerPC:
- http://security.debian.org/pool/updates/main/e/evolution/evolution_1.0.5-1woody2_powerpc.deb
- http://security.debian.org/pool/updates/main/e/evolution/libcamel-dev_1.0.5-1woody2_powerpc.deb
- http://security.debian.org/pool/updates/main/e/evolution/libcamel0_1.0.5-1woody2_powerpc.deb
- http://security.debian.org/pool/updates/main/e/evolution/libcamel-dev_1.0.5-1woody2_powerpc.deb
- IBM S/390:
- http://security.debian.org/pool/updates/main/e/evolution/evolution_1.0.5-1woody2_s390.deb
- http://security.debian.org/pool/updates/main/e/evolution/libcamel-dev_1.0.5-1woody2_s390.deb
- http://security.debian.org/pool/updates/main/e/evolution/libcamel0_1.0.5-1woody2_s390.deb
- http://security.debian.org/pool/updates/main/e/evolution/libcamel-dev_1.0.5-1woody2_s390.deb
- Sun Sparc:
- http://security.debian.org/pool/updates/main/e/evolution/evolution_1.0.5-1woody2_sparc.deb
- http://security.debian.org/pool/updates/main/e/evolution/libcamel-dev_1.0.5-1woody2_sparc.deb
- http://security.debian.org/pool/updates/main/e/evolution/libcamel0_1.0.5-1woody2_sparc.deb
- http://security.debian.org/pool/updates/main/e/evolution/libcamel-dev_1.0.5-1woody2_sparc.deb
MD5 checksums of the listed files are available in the original advisory.